TY - JOUR
T1 - Stealth attacks on ad-hoc wireless networks
AU - Jakobsson, Markus
AU - Wetzel, Susanne
AU - Yener, Bülent
PY - 2003
Y1 - 2003
N2 - We study two classes of attacks that can be mounted by manipulation of routing information and exhaustive power consumption. Our attacks allow an attacker to partition a network, reduce its goodput, hi-jack and filter traffic from and to victim nodes, and thereby eavesdrop and perform traffic analysis. The methods described are "stealth attacks" in that they minimize the cost to and visibility of the attacker. We introduce the notion of reputation based control, and suggest that it can be used to augment existing routing protocols in order to immunize these against stealth attacks.
AB - We study two classes of attacks that can be mounted by manipulation of routing information and exhaustive power consumption. Our attacks allow an attacker to partition a network, reduce its goodput, hi-jack and filter traffic from and to victim nodes, and thereby eavesdrop and perform traffic analysis. The methods described are "stealth attacks" in that they minimize the cost to and visibility of the attacker. We introduce the notion of reputation based control, and suggest that it can be used to augment existing routing protocols in order to immunize these against stealth attacks.
UR - http://www.scopus.com/inward/record.url?scp=4143141933&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=4143141933&partnerID=8YFLogxK
U2 - 10.1109/vetecf.2003.1285396
DO - 10.1109/vetecf.2003.1285396
M3 - Conference article
AN - SCOPUS:4143141933
SN - 0740-0551
VL - 58
SP - 2103
EP - 2111
JO - IEEE Vehicular Technology Conference
JF - IEEE Vehicular Technology Conference
IS - 3
T2 - 2003 IEEE 58th Vehicular Technology Conference, VTC2003-Fall
Y2 - 6 October 2003 through 9 October 2003
ER -